Filtered by vendor Akuvox
Subscriptions
Filtered by product E11 Firmware
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-0355 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 6.5 Medium |
Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information. | ||||
CVE-2023-0354 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 9.1 Critical |
The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs. | ||||
CVE-2023-0353 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 7.2 High |
Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file. | ||||
CVE-2023-0352 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 9.1 Critical |
The Akuvox E11 password recovery webpage can be accessed without authentication, and an attacker could download the device key file. An attacker could then use this page to reset the password back to the default. | ||||
CVE-2023-0351 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 8.8 High |
The Akuvox E11 web server backend library allows command injection in the device phone-book contacts functionality. This could allow an attacker to upload files with executable command instructions. | ||||
CVE-2023-0350 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 6.5 Medium |
Akuvox E11 does not ensure that a file extension is associated with the file provided. This could allow an attacker to upload a file to the device by changing the extension of a malicious file to an accepted file type. | ||||
CVE-2023-0349 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 7.5 High |
The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera. | ||||
CVE-2023-0348 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 7.5 High |
Akuvox E11 allows direct SIP calls. No access control is enforced by the SIP servers, which could allow an attacker to contact any device within Akuvox to call any other device. | ||||
CVE-2023-0347 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 7.5 High |
The Akuvox E11 Media Access Control (MAC) address, a primary identifier, combined with the Akuvox E11 IP address, could allow an attacker to identify the device on the Akuvox cloud. | ||||
CVE-2023-0346 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 7.5 High |
Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known. | ||||
CVE-2023-0345 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 9.8 Critical |
The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user. | ||||
CVE-2023-0344 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 9.1 Critical |
Akuvox E11 appears to be using a custom version of dropbear SSH server. This server allows an insecure option that by default is not in the official dropbear SSH server. | ||||
CVE-2023-0343 | 1 Akuvox | 2 E11, E11 Firmware | 2024-11-21 | 6.5 Medium |
Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. |
Page 1 of 1.